US12079090B2 - Method for data backup in a vehicle, corresponding control device, computer program and motor vehicle - Google Patents
Method for data backup in a vehicle, corresponding control device, computer program and motor vehicle Download PDFInfo
- Publication number
- US12079090B2 US12079090B2 US17/871,503 US202217871503A US12079090B2 US 12079090 B2 US12079090 B2 US 12079090B2 US 202217871503 A US202217871503 A US 202217871503A US 12079090 B2 US12079090 B2 US 12079090B2
- Authority
- US
- United States
- Prior art keywords
- data
- control device
- datum
- vehicle
- cryptographically
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
Definitions
- the present disclosure relates to a method for data backup in a vehicle. Furthermore the present disclosure relates to a control device that executes such a method, a computer program to execute the method and a motor vehicle that is arranged to execute such a method or has multiple such control devices.
- the data are stored only locally in a non-volatile memory of the respective control device. This is easy to implement but also easy to manipulate.
- the so-called distance protection is used.
- data that are used to calculate the distance traveled are sent to multiple control devices in the vehicle and redundantly stored there in a cryptographically secure memory area. If, for example, the kilometrage is then overwritten in only one of the control devices, then by means of comparison of the stored kilometrages, a manipulation may be recognized.
- this distance protection is technically very costly and is therefore not suitable as a general approach to secure distributed data storage in the vehicle.
- EDR event data recorder
- DE102014221977A1 One method for storage of data in a motor vehicle is disclosed in DE102014221977A1, in which a central or distributed data memory in the vehicle network is made available to the control devices connected to the vehicle network as a local memory.
- application software executed on a control device connects over the vehicle network with the data memory and logically connects the data memory to the control device and can access the connected data memory over the vehicle network.
- US20200274892A1 describes a method in which in a vehicle network a certificate is transmitted from a first control device to multiple second control devices when these are activated for the first time. Encrypted inherent information is then received by the second control devices, which was encrypted with a public key associated with the certificate and is decrypted and stored with a private key associated with the certificate. Thereupon in the event of a suspicious control device, an inherent information may be transmitted by the first control device, with the certificate associated with the first control device, to this suspected control device. Inherent information then received from the suspicious control device, encrypted with the public key is then decrypted with the private key and compared with the previously stored inherent information. If a deviation is thus detected, the suspicious control device is classified as an abnormal control device.
- a system for preventing manipulation of recorded accumulated running distance in which multiple memory units are provided, in which accumulated driving distance data and the vehicle number are stored. If a deviation between the vehicle serial number data stored in the manipulation protection control unit and the vehicle serial number data stored in the other memory units is detected, an error message is output and deviating accumulated distance data in one of the other memory units is overwritten by the accumulated distance data in the manipulation protection unit.
- aspects of the present disclosure are directed to technologies and techniques for improved data backup in a vehicle and a corresponding control device.
- a method for data backup in a vehicle comprising: generating a datum through a function implemented on a first control device of the vehicle; determining the securing of the data generated using the configuration data filed in the first control device; cryptographic marking and/or encrypting of the datum if the data generated is to be protected; storing the cryptographically marked and/or encrypted datum in a memory in of the first control device; and sending the cryptographically marked and/or encrypted datum or a value derived therefrom to at least one second control device.
- a secure, authentic storage of data may be configured for which an interest in their manipulation may be assumed, and may be implemented with low coordination and implementation costs.
- the precise configurations of the cryptographic method and the distribution method are generic here, and nearly transparent for the function to be called up. Therefore, a high degree of variability in the method actually used is possible, without additional costs resulting from the design and development of the functions to be placed thereon. This variability also continues to exist in late phases of the product life cycle.
- additional data to be protected may be determined, or already-protected data may be shifted to other methods without changes to the software of the control devices being necessary.
- adjustment is easily made at any time even after the marketing of a vehicle model at any time.
- the marked data may be readily authenticated. If the data are encrypted in addition, these data, after encryption, should not be filed either on a first control device or on a second control device in a secure memory area. In that the cryptographic key used therefor was generated in advance by the manufacturer, it is ensured that even in the case of damage to or loss of the control device affected, it will still be available for verifying the authenticity or for decrypting the data.
- the cryptographically marked and/or encrypted datum or the value derived therefrom can be transmitted over an electronic network of the vehicle to a second control device of the vehicle.
- a method is disclosed relative to the second control device, comprising the steps of: receiving the cryptographically marked and/or encrypted datum or the value derived therefrom through the second control device; and storing the received datum or the value derived therefrom in a memory of the second control device.
- the decision may be made as to which data should be protected.
- configuration data may include instructions concerning which data should be protected by means of which cryptographic methods.
- configuration data may include instructions concerning to which other control devices the data to be protected should be sent.
- the cryptographic marking and/or encrypting and the distributed storage of a datum is activated if a predefined event is detected.
- the cryptographic marking and/or encrypting, and the distributed storage of a datum is activated if a warning message of a possible malfunction or a recognized attack is detected on a component of the vehicle electronics.
- the data distributor module may be arranged, using the configuration data filed in the data distributor module, to decide whether a datum generated should be protected.
- the data distributor module is arranged, using the configuration data filed in the data distributor module, to decide which generated data should be protected by means of which cryptographic methods.
- the data distributor module may be advantageously arranged, using the configuration data filed in the data distributor module, to decide to which other control devices the cryptographically protected data are sent.
- the communication module may be arranged to receive a cryptographically marked and/or encrypted datum or a value derived therefrom from another control device.
- a computer program according to the present disclosure may include instructions that cause the one or multiple control devices of the vehicle to execute the steps of the method according to the present disclosure.
- the present disclosure also discloses a motor vehicle that is arranged to execute a method according to the present disclosure or at least has a control device according to the present disclosure.
- FIG. 1 shows schematically a method for data backup in a vehicle, according to some aspects of the present disclosure
- FIG. 2 shows schematically two control devices with a data storage, in which, in addition to a regular storage process in a local memory, a distributed data storage takes place according to some aspects of the present disclosure
- FIG. 3 shows schematically a plurality of control devices, wherein, using a configuration present in a first control device, a distributed data stored takes place in some of the other storage devices according to some aspects of the present disclosure
- FIG. 4 shows schematically a block diagram of a control device, according to some aspects of the present disclosure.
- FIG. 1 shows schematically an exemplary embodiment for a method according to the present disclosure for data backup in a vehicle, such as a passenger car.
- the method enables manipulation-proof storage of data on vehicle use.
- a datum or multiple data are generated by a function implemented on a first control device of the vehicle.
- data on the vehicle use can be generated.
- the data on vehicle use are understood here to include any parameters concerning the vehicle that are determined at a certain time.
- kilometrage information concerning times of use such as the time the vehicle is started and stopped, or the duration of the respective vehicle use (“operating hours”), GPS coordinates of the vehicle's parking location or information on accidents or servicing may be captured.
- data that are obliged to be recorded pursuant to statutory requirements or information as to whether the vehicle is in manual, semi-autonomous or autonomous driving mode or when a switch is made from one of these driving modes to another driving mode can be generated.
- the capturing of the data may, for example, take place at certain times or certain events such as the start or end of a vehicle drive, in the event of an accident or vehicle servicing, or even at regular intervals, without a certain event having to occur. Likewise, however, this can also take place, for example, upon changing the parameters captured by a predefined amount or at the time of activation of a vehicle component.
- a process step 2 for the datum generated using configuration data filed in the first control device, it is determined whether and if so, how the backup and distribution of the datum should take place.
- the configuration data can have been imported into the control device at any time.
- configuration data can be generated already in the production of the vehicle and inscribed in the control device. But these original configuration data can then at some later time be modified in the control device, for example to adapt to changing framework conditions, such as statutory requirements or a changed assessment of risks to which the vehicle and the data are exposed.
- the configuration data can be structured in the form of a list whose entries include instructions for the backup of data to be stored.
- Such instructions may include in particular the following components:
- the datum or data, or even the type or category of data on which the action defined in the respective instruction is to be applied may be, for example, the logical identifier of a certain memory area.
- the type of backup e.g., the cryptographic method to be applied in the data backup and the cryptographic key to be used therein.
- the distribution takes place randomly or according to the availability of the memory or in accordance with the connection speed, which can, for example, be derived from the sequence in which the connection was structured at the last start.
- the distribution can also be set as status-dependent, depending on the last storage location, always to the same storage location or alternating. It may also be provided that data are stored distributed and authenticated if a particular event has occurred.
- a secure distributed data storage is to take place not statically per configuration, but instead, or additionally, depending upon a predefined event, is then decided in an optional process step. 3 .
- this can be activated by a warning message, for example a so-called “watchdog” function for cyclical monitoring and failure detection or a so-called intrusion detection system to recognize extreme attacks.
- triggering could take place through an analysis by a so-called security operation centers.
- process step 4 the capture of events takes place, wherein upon capture of the predefined event, the process is then continued in process step 5 .
- the process may also run out without the optional process step 3 and 4 , so that in this case after determining the backup and distribution using the configuration data in process step 2 , the process is immediately continued in process step 5 .
- a datum to be protected is then cryptographically marked and/or encrypted.
- recourse may be had to a cryptographic method known to the person skilled in the art.
- the key needed for the cryptographic operations was imported into the control device in advance, for example by the manufacturer in production, via a secured transport channel, with the key having been stored in a secure memory area.
- the data thus marked are authentic:
- the data may also be encrypted, for example in the case of data protection-relevant data.
- the cryptographically marked and/or encrypted datum is then stored in a memory of the first control device in a process step 6 .
- the cryptographically marked and/or encrypted datum or a value derived therefrom is sent over an electronic network of the vehicle to one or multiple control devices and received by these in process step 8 , and finally, in a process step 9 , stored in these control devices.
- the function to be placed can allow the correct storage or authenticity of the local security-critical data to be confirmed.
- configuration parameters at risk for manipulation can be verified.
- FIG. 2 shows schematically using two control devices SG_a and SG_b the distributed and authentic data storge according to the present disclosure.
- the two control devices each have an internal data distributor module DVM_a or DVM_b as well as a local memory module S_a or S_b.
- a data distributor module is present in each of the control devices involved in the distributed data storage.
- the data distributor module is in each case integrated into the basic software of the control device involved such that access to the internal data memory of the respective control device, e.g., reading and writing of data, are managed by this module.
- the data distributor model is given a connection to one or multiple cryptography modules of the respective control device in order to be able to secure data and verify the securing. Furthermore, the data distributor module is given the opportunity, via a communication module, to send and receive data by means of a communication module over the vehicle's internal network. For reasons of brevity, the cryptography and communication module are not represented in FIG. 2 .
- control device SG_a All the data to be stored on control device SG_a are fed through the data distributor module DVM_a.
- the decision as to which of these data are protected by means of which cryptographic methods and to which other control devices they are sent is made by the data distributor module using a configuration K, which contains instructions or rules for the data distributor module.
- the need for securing can be determined “externally”, without having to modify the software of the control device, so that no additional programming or software integration expense is needed for this.
- the configuration can easily be modified retroactively, for example as part of a remote update executed over the vehicle's mobile radio connection.
- an internal function F writes a datum identified as worthy of protection on the first control device SG_a into the internal memory S_a of the control device SG_a
- this datum is marked or encrypted by the data distributor module DVM_a located on the control device SG_a in accordance with the configuration K and sent over the vehicle network to a data distributor module DVM_b located on the second control device SG_b.
- the data distributor module DVM_b then stores the datum in the local S_b of the second control device SG_b.
- the datum additionally stored in the local memory S_b of the second control device SG_b can then, as needed, be read again.
- the reading may be triggered by the original function F on the first control device SG_a or by a cyclically-executed consistency verification on the part of the data distributor module DVM_a located on the control device SG_a.
- the datum can also be read again for forensic purposes.
- the function to be placed requests the protected and distributed storage in a targeted manner by calling the data distributor module.
- the function can thereby transmit the desired type of securing and storage together with the data. But even in this case the details of the respective method and the implementation continue to be abstracted by the function.
- FIG. 3 The authentic distributed composite data storage according to the present disclosure is further illustrated using FIG. 3 .
- a datum is transmitted by an internal function F on the first control device SG_a, initially unencrypted, to the internal data distributor module DVM_a.
- the data distributor module DVM_a then transmits the marked or encrypted datum on the one hand to the internal local memory S_a.
- a distributed data storage takes place in some of the other control devices SG_b connected to the first control device SG_a over the vehicle network.
- the marked or encrypted datum is transmitted in accordance with the configuration data to three of the six other control devices SG_b and stored there.
- composite data storage according to the present disclosure can be integrated seamlessly into a typical automotive software architecture and occasions only very minor changes, if any, in other software modules.
- the method according to the present disclosure is preferably executed as a computer program on a control device.
- the computer program is transferred to a memory of the respective control device in the manufacture of the control device and stored there.
- the computer program comprises instructions that, upon execution by a processor of the control device, cause the control device to execute the steps according to the method according to the present disclosure.
- the processor can comprise one or multiple processor units, for example microprocessors, digital signal processors or combinations thereof.
- the memory can have volatile as well as non-volatile memory areas and can, for example, be configured as a semiconductor memory. Furthermore, the memory can consist of a memory chip, possibly with multiple partitions for data of different categories that are separate from one another, or multiple memory chips separated from one another for data of different categories.
- the memory chips can, for example, be configured as random access memory (RAM), dynamic random access memory (DRAM), EPROM or flash memory, wherein it may be ensured through a constant power supply that the data set is not lost.
- FIG. 4 shows schematically a block diagram of a control device according to the present disclosure.
- the control device can be provided to control any functionalities of a vehicle and to this end can have the greatest variety of functions and software applications.
- this may be an airbag control device that provides data in the event of the vehicle being involved in an accident, such as the deployment of an airbag or the so-called crash severity, or an engine control device that provides data with regard to the vehicle's operating hours.
- the control device SG has various modules for the execution of the method according to the present disclosure, which may be implemented as software or hardware.
- a function module FM generates data, for example based on signals from one or more of the vehicle's sensors.
- a data distributor module DVM is provided that, as described above, regulates the distributed storage and securing and data using configuration data filed there.
- a cryptography module KRM the data are marked and/or encrypted before they are stored locally in a memory module SM and by means of a communication module KOM are sent over an electronic network of the vehicle to one or multiple control devices not shown here.
- the network is structured in particular as a bus system B, for example as a CAN, MOST, FlexRay, or automotive ethernet bus.
- DVM_a DVM_b, DVM data distributor module
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
- Combined Controls Of Internal Combustion Engines (AREA)
Abstract
Description
Claims (20)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE102021207956.3 | 2021-07-23 | ||
| DE102021207956.3A DE102021207956A1 (en) | 2021-07-23 | 2021-07-23 | Method for data backup in a vehicle, corresponding control unit, computer program and motor vehicle |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20230029245A1 US20230029245A1 (en) | 2023-01-26 |
| US12079090B2 true US12079090B2 (en) | 2024-09-03 |
Family
ID=84784664
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/871,503 Active 2042-09-13 US12079090B2 (en) | 2021-07-23 | 2022-07-22 | Method for data backup in a vehicle, corresponding control device, computer program and motor vehicle |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US12079090B2 (en) |
| CN (1) | CN115688157A (en) |
| DE (1) | DE102021207956A1 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE102024117825A1 (en) * | 2024-06-25 | 2026-01-08 | WAGO Verwaltungsgesellschaft mit beschränkter Haftung | SENDER, RECEIVER AND METHOD FOR VERIFYING THE VALIDITY OF DATA TRANSMITTED ACROSS A TRANSMITTING CHANNEL |
Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050045713A1 (en) | 2003-08-27 | 2005-03-03 | Ko Seong Yun | System and a method for preventing tampering with a recorded accumulated running distance of a vehicle |
| US20080107274A1 (en) * | 2006-06-21 | 2008-05-08 | Rf Code, Inc. | Location-based security, privacy, assess control and monitoring system |
| US20130198813A1 (en) * | 2012-01-31 | 2013-08-01 | Nxp B.V. | Configuration method, configuration device, computer program product and control system |
| DE102014201038A1 (en) | 2014-01-21 | 2015-07-23 | Bayerische Motoren Werke Aktiengesellschaft | Method for encrypting, storage system for a vehicle, motor vehicle with a storage system and computer-readable storage medium |
| US20150332043A1 (en) * | 2014-05-15 | 2015-11-19 | Auckland Uniservices Limited | Application analysis system for electronic devices |
| DE102014221977A1 (en) | 2014-10-28 | 2016-04-28 | Robert Bosch Gmbh | Method and device for storing data in a motor vehicle |
| US10397216B2 (en) * | 2016-11-18 | 2019-08-27 | Veritas Technologies Llc | Systems and methods for performing secure backup operations |
| US20190340850A1 (en) | 2015-11-26 | 2019-11-07 | Psa Automobiles S.A. | Method and Terminal For Controlling the Establishment of a Vehicle Accident Report |
| US20200274892A1 (en) | 2019-02-21 | 2020-08-27 | Hyundai Motor Company | Method and System for Providing Security on In-Vehicle Network |
| US20210288822A1 (en) * | 2020-03-16 | 2021-09-16 | Uatc, Llc | Systems and Methods for Onboard Vehicle Certificate Distribution |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120116605A1 (en) * | 2010-11-05 | 2012-05-10 | Continental Automotive Systems, Inc. | Electronic vehicle security key |
| DE102019212959B3 (en) * | 2019-08-28 | 2021-03-04 | Volkswagen Aktiengesellschaft | Method for protected communication between a vehicle and an external server, device for carrying out key derivation in the method and vehicle |
-
2021
- 2021-07-23 DE DE102021207956.3A patent/DE102021207956A1/en active Pending
-
2022
- 2022-07-21 CN CN202210862325.5A patent/CN115688157A/en active Pending
- 2022-07-22 US US17/871,503 patent/US12079090B2/en active Active
Patent Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050045713A1 (en) | 2003-08-27 | 2005-03-03 | Ko Seong Yun | System and a method for preventing tampering with a recorded accumulated running distance of a vehicle |
| US20080107274A1 (en) * | 2006-06-21 | 2008-05-08 | Rf Code, Inc. | Location-based security, privacy, assess control and monitoring system |
| US20130198813A1 (en) * | 2012-01-31 | 2013-08-01 | Nxp B.V. | Configuration method, configuration device, computer program product and control system |
| DE102014201038A1 (en) | 2014-01-21 | 2015-07-23 | Bayerische Motoren Werke Aktiengesellschaft | Method for encrypting, storage system for a vehicle, motor vehicle with a storage system and computer-readable storage medium |
| US20150332043A1 (en) * | 2014-05-15 | 2015-11-19 | Auckland Uniservices Limited | Application analysis system for electronic devices |
| DE102014221977A1 (en) | 2014-10-28 | 2016-04-28 | Robert Bosch Gmbh | Method and device for storing data in a motor vehicle |
| US20190340850A1 (en) | 2015-11-26 | 2019-11-07 | Psa Automobiles S.A. | Method and Terminal For Controlling the Establishment of a Vehicle Accident Report |
| US10397216B2 (en) * | 2016-11-18 | 2019-08-27 | Veritas Technologies Llc | Systems and methods for performing secure backup operations |
| US20200274892A1 (en) | 2019-02-21 | 2020-08-27 | Hyundai Motor Company | Method and System for Providing Security on In-Vehicle Network |
| US20210288822A1 (en) * | 2020-03-16 | 2021-09-16 | Uatc, Llc | Systems and Methods for Onboard Vehicle Certificate Distribution |
Also Published As
| Publication number | Publication date |
|---|---|
| DE102021207956A1 (en) | 2023-01-26 |
| CN115688157A (en) | 2023-02-03 |
| US20230029245A1 (en) | 2023-01-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10229547B2 (en) | In-vehicle gateway device, storage control method, and computer program product | |
| CN108762783B (en) | Software updating method and device for vehicle system and vehicle system | |
| JP5975964B2 (en) | Information processing program, information processing method, information processing apparatus, and information processing system | |
| Wolf et al. | State of the art: Embedding security in vehicles | |
| US10752207B2 (en) | Multi-factor authentication of a hardware assembly | |
| US11240211B2 (en) | System and method to leverage EDR, ECU, CAN and OBD data from vehicles by means of blockchain technology | |
| US8380978B2 (en) | Electrical system of a motor vehicle with a master security module | |
| US11544408B2 (en) | Method and system for managing vehicle generated data | |
| CN101559745A (en) | Vehicle control system for preventing stealing and robbery and implementation method thereof | |
| US20190034637A1 (en) | In-vehicle apparatus for efficient reprogramming and controlling method thereof | |
| US20210273809A1 (en) | Method for securing vehicle components and corresponding vehicle component | |
| US10025954B2 (en) | Method for operating a control unit | |
| KR102358833B1 (en) | Method and system for collecting and managing event data which is recorded by vehicle | |
| US12120506B2 (en) | Devices, methods, and computer program for releasing transportation vehicle components, and vehicle-to-vehicle communication module | |
| US12079090B2 (en) | Method for data backup in a vehicle, corresponding control device, computer program and motor vehicle | |
| US9276738B2 (en) | Digital tachograph | |
| CN110727546A (en) | Automobile data backup method and device | |
| US20240275581A1 (en) | Data storage system, mobile object, and non-transitory computer readable storage medium | |
| CN109063514B (en) | Method, apparatus, device and computer-readable storage medium for preventing data tampering | |
| CN117149521A (en) | Network-connected automobile data backup method and system | |
| JP4321303B2 (en) | Program distribution system and in-vehicle gateway device | |
| Langer et al. | Security analysis of an Event Data Recorder system according to the HEAVENS model | |
| KR101990959B1 (en) | Black box system for guaranteeing data integrity and method dof cotnrolling the same | |
| Chen et al. | Accident-Driven Secure Uplink Scheme for Automotive Event Data Recorder (Edr) Data Based on Trusted Execution Environment (Tee) | |
| US20250304120A1 (en) | Vehicle control device and method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| AS | Assignment |
Owner name: VOLKSWAGEN AKTIENGESELLSCHAFT, GERMANY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WINKELVOS, TIMO;FERNANDEZ, ALJOSCHA;SIGNING DATES FROM 20220727 TO 20220825;REEL/FRAME:060944/0219 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |